"Seventeen mysterious cellphone towers have been found in America which look like ordinary towers, and can only be identified by a heavily customized handset built for Android security – but have a much more malicious purpose, according to Popular Science."

"The rulebook, which The Intercept is publishing in full, was developed behind closed doors by representatives of the nation’s intelligence, military, and law-enforcement establishment, including the Pentagon, CIA, NSA, and FBI. Emblazoned with the crests of 19 agencies, it offers the most complete and revealing look into the secret history of the government’s terror list policies to date. It reveals a confounding and convoluted system filled with exceptions to its own rules, and it relies on the elastic concept of “reasonable suspicion” as a standard for determining whether someone is a possible threat."

"Below, you’ll find an interactive map charting the growth of the modern fibre optic network between 1989 to the modern day, and including cables to be completed in the next few years. You can select a country to see all connections to and from that nation, or specify a provider to see the parts of the network owned by that company."

"Following the June 2013 Edward Snowden leaks we observe an increased pace of innovation, specifically new competing jihadist platforms and three (3) major new encryption tools from three (3) different organizations – GIMF, Al-Fajr Technical Committee, and ISIS – within a three to five-month time frame of the leaks."

"The publication of the 1989 Iran volume was a milestone in the history of U.S. government secrecy that prompted widespread outrage and ridicule, but it also inspired remedial efforts that had some lasting impact."

"In the initial deployment, collection systems are recording “every single” conversation nationwide, storing billions of them in a 30-day rolling buffer that clears the oldest calls as new ones arrive, according to a classified summary."

"“At the same time, based on authorization from President Eisenhower’s statements at an NSC meeting on August 18, 1960, discussions began to develop highly sensitive, tightly-held plans to assassinate Lumumba. After Lumumba’s death at the hands of Congolese rivals in January 1961, the U.S. Government authorized the provision of paramilitary and air support to the new Congolese Government….”"

This book is in three volumes, and appears to be about magic—specifically, about using spirits to communicate over long distances. Since the publication of the decryption key to the first two volumes in 1606, they have been known to be actually concerned with cryptography and steganography. Until recently, the third volume was widely still believed to be solely about magic, but the "magical" formulae have now been shown to be covertexts for yet more cryptography content.[5] H